Preface, Page 2

3. Engage in ongoing threat assessment and risk analysis of the Root Server System and recommend any necessary [SW2] [audit]  

[SW2] Audit is an extremely dangerous word here activity to assess the current status of root servers and the root zone.

  • No labels